Sample Network+ 2009 This workbook is designed to go hand in hand with LearnKey online courseware. All material is copyrighted. It is illegal to duplicate this material without permission from the publisher. Belongs to: ____________________________________ School: _______________________________________ Instructor: _____________________________________ To order additional copies contact: 35 North Main St. George, UT 84770 1.435.674.9733 www.learnkey.com
56
Embed
Sample - Online IT Video Training Courses | Elearning Online …_teacher.pdf · · 2009-08-05Topologies Bus Topology Ring Topology Star Topology Mesh Topology ... 2.3 Identify common
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Sam
ple
Network+ 2009
This workbook is designed to go hand in hand
with LearnKey online courseware. All material is
copyrighted. It is illegal to duplicate this material
without permission from the publisher.
Belongs to: ____________________________________
School: _______________________________________
Instructor: _____________________________________
To order additional copies
contact:
35 North Main
St. George, UT 84770
1.435.674.9733
www.learnkey.com
Sam
ple
Network+ 2009
First Edition
LearnKey, Inc. provides self-paced training courses and online learning solutions to
education, government, business and individuals world-wide. With dynamic video
based courseware, and effective learning management systems, LearnKey solutions
provide expert instruction for popular computer software, technical certifications and
application development. LearnKey delivers content on the Web, by enterprise
network, and on interactive CD-ROM. For a complete list of courses visit:
http://www.learnkey.com
Trademarks: All brand names and product names used in this book are trade names,
service marks, trademarks or registered trademarks of their respective owners.
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means
now known or to be invented, electronic or mechanical, including photocopying, recording, or by any
information storage or retrieval system without written permission from the author or publisher, except
for the brief inclusion of quotations in a review.
3.1 Install, configure and differentiate between common
network devices: Basic switch, Bridge.
3.3 Explain the advanced features of a switch: Spanning
tree.
Structured Cabling Structured Cabling Defined Structured Cabling Terminology Rack Units Wiring Distribution Main Distribution Frame Patch Panel Patch Cables Horizontal Run Demonstration 66 Block Wiring Schematic Physical Network Diagram
2.0 Network Media and Topologies
2.8 Install components of wiring distribution: Vertical and
Toner probe, Punch down tool, Cable stripper, Snips.
Introduction xiii
In
trod
uctio
n
Sam
ple
Introducing TCP/IP Protocoll Suite
Broadcasting NetBIOS/NetBEUI Logical Network Addressing Routing IP Naming Importance TCP/UDP/ICMP
1.0 Network Technologies
1.1 Explain the function of networking protocols: TCP,
FTP UDP, TCP/IP suite, ICMP.
1.4 Given a scenario, evaluate the proper use of the
following addressing technologies and addressing schemes:
Broadcast.
Basic IP Addressing IP Addressing Defined Unique Addresses Subnet Mask Network ID Binary vs. Decimal Converting Binary to Decimal Dotted-Decimal Converting Decimal to Binary
1.0 Network Technologies
1.4 Given a scenario, evaluate, the proper use of the
following addressing technologies and addressing schemes;
Addressing Technologies: Subnetting.
Advanced IP Addressing Class Licenses CIDR Configuring IP Ping Arp MAC IP Tools Linux IP Tools
1.0 Network Technologies
1.1 Explain the function of common networking protocols:
ARP, ICMP.
1.4 Given a scenario, evaluate the proper use of the
following addressing technologies and addressing schemes;
Addressing schemes: classful vs. classless (e.g. CIDR,
Supernetting).
5.0 Network Tools
5.1 Given a scenario, select the appropriate command line
interface tool and interpret the output to verify
functionality: Ping, Arp Ping, Arp
xiv Introduction
In
trod
uctio
n
Sam
ple
Session 3
Subnetting Understanding Subnetting Subnet Setup Extending the Subnet Calculating Hosts Determining IP Addresses Defining Network IDs Applying Subnetting Example Subnetting Scenario
1.0 Network Technologies
1.3 Identify the following address formats: IPv6, IPv4, MAC
addressing.
1.4 Given a scenario, evaluate the proper use of the following
addressing technologies and addressing schemes. Addressing
Technologies; Subnetting.
DHCP Understanding DHCP DHCP Client Side DHCP Server Administering DHCP Server Renewing DHCP lease APIPA Windows DHCP Server Rogue DHCP Server
1.0 Network Technologies
1.1 Explain the function of common networking protocol:
DHCP.
1.4 Given a scenario, evaluate the proper use of the following
addressing technologies and addressing schemes; Addressing
Technologies: DHCP (static, dynamic APIPA).
3.0 Network Devices
3.1 Install, configure and differentiate between common
network devices: Basic DHCP server.
5.0 Network Tools
5.1 Given a scenario, select the appropriate command line
interface tool and interpret the output to verify functionally:
Ipconfig.
Network Naming Name Resolution Host File DNS DNS Server DNS in Action Configuring DNS Reverse Lookup Zones Root Hints Forwarder Servers Nslookup Dig
1.0 Network Technologies
1.1 Explain the function of common networking protocols:
DNS
3.0 Network Devices
3.2 Identify the functions of specialized network devices:
DNS server.
5.0 Network Tools
5.1 Given a scenario, select the appropriate command line
interface tool and interpret the output to verify functionality:
Nslookup, Dig.
Windows Name Resolution WINS SMB/CIFS NetBIOS Commands
5.0 Network Tools
5.1 Given a scenario, select the appropriate command line
interface tool and interpret the output to verify functionality:
Hostname, Nbtstat.
Introduction xv
In
trod
uctio
n
Sam
ple
Introducing TCP/IP Ports Ports Defined
Netstat TCPView Wireshark Packet Filtering
4.0 Network Management
4.4 Conduct network monitoring to identify performance
and connectivity issues using the following: Network
Theft Power HVAC Fire Hardware Failure Antivirus / Malware DoS Man in the Middle Rogue Access Points Social Engineering Protection Checklist Baselines Patches / Updates Configurations Regulations
4.0 Network Management
4.2 Identify types of configuration management
documentation: Baselines, Policies, procedures and
configurations, Regulations.
6.0 Network Security
6.5 Explain issues that affect device security: Physical
security, Restricting local remote access.
6.6 Identify common security threats and mitigation
Attackers, Man in the Middles, Smurf, Rogue access points,
Social engineering (phishing). Mitigation techniques:
Policies and procedures User training, Paths and updates.
The Art of Network Support Nine Step Process 4.0 Network Management
4.6 Given a scenario, implement the following network
troubleshooting methodology: Information gathering-
identify symptoms and problems, Identify the affected
areas of the network, Determine if anything has changed,
Establish the most probable cause, Determine if escalation
is necessary, Create an action plan and solution identifying
potential effects, Implement and test the solution, Identify
the results and effects of the solution, Document the
solution and the entire process.
Lab 1: LAN Issues NIC Configuration Speed / Duplex Issues Wrong IP Address Dynamic vs. Static IP / DNS VLAN Issues Angry IP Scanner Port Mirroring Impedence Mismatch Logs
4.0 Network Management
4.4 Conduct network monitoring to identify performance
and connectivity issues using the following: System logs,
history logs, event logs.
4.7 Given a scenario, troubleshoot common connectivity
issues and select an appropriate solution; Physical issues:
Open impedance mismatch (echo). Logical issues: Port
Speed, Port duplex mismatch, Incorrect VLAN, Incorrect
IP address, Wrong gateway, Wrong DNS, Wrong subnet
Protocol Suite Broadcasting NetBIOS/NetBEUI Logical Network Addressing Routing IP Naming Importance TCP/IP TCP/UDP/ICMP
Basic IP Addressing
IP Addressing Defined Unique Addresses Subnet Mask Network ID Binary vs. Decimal Converting Binary to Decimal Dotted Decimal Converting Decimal to Binary
Advanced IP Addressing
Class Licenses CIDR Configuring IP Ping ARP Mac IP Tools Linux IP Tools
xxiv Introduction
In
trod
uctio
n
Sam
ple
Subnetting
Understanding Subnetting Subnet Setup Extending the Subnet Calculating Hosts Determining IP Addresses Determining Network IDs Applying Subnetting Example Subnetting Scenarios
DHCP
Understanding DHCP DHCP Client Side DHCP Server Administering DHCP Server Renewing DHCP Lease APIPA Windows DHCP Server Rogue DHCP Server
Network Naming
Name Resolution Host File DNS DNS Server DNS in Action Reverse Lookup Zones Root Hints Forwarder Servers Nslookup Dig
Windows Name Resolution
WINS SMB/CIFS NetBIOS Commands
Introducing TCP/IP Ports
Ports Defined Netstat TCPView Wireshark Packet Filtering
Misconfigurations NIC Configurations Speed/Duplex Issues IP Address Issues Dynamic vs. Static IP/DNS VLAN Issues Angry IP Scanner Port Monitoring Impedance Mismatch Logs
Interface ESSID Mismatch Incorrect Encryption Incorrect Channel Incorrect Frequency
xxviii Introduction
In
trod
uctio
n
Sam
ple
Sample Lesson Plans
5 Week Plan Monday Tuesday Wednesday Thursday Friday
Week 1
Session 1 Pre-Test Introduction
Packets Glossary
Word Search
Matching Crossword
Topologies Building a Network
with OSI Research Topic
Network Cabling Ethernet Basics
10/100Base Ethernet Group Project
Short Answer
Individual Project
Labs
Session 1 Post
Test
Week 2
Session 2 Pre-Test Read Article::
CompTIA Gets Techni-cal
Glossary Crossword
Word Search
Matching
Modern Ethernet
Structured Cabling
Structured Cabling
Tools
Group Project
Introducing TCP/IP Basic IP Addressing
Advanced IP Addressing Individual Project
Short Answer
Labs
Research Topic
Session 2 Post Test
Week 3
Session 3 Pre-Test
Glossary Word Search Subnetting
DHCP
Matching Crossword
Network Naming Windows Name
Resolution Research Topic
Introducing TCP/IP Ports
Static Routing Firewalls
Short Answers Group Project
Individual Project Labs
Session 3 Post Test
Week 4
Session 4 Pre-Test
Glossary Crossword
Internet Applications
Part I
Word Search
Matching
Group Project
Internet Applica-
tions Part II
Encryption
Authentication Wireless
Implementing Wireless Individual Project
Advanced Networking
Devices
Labs
Short Answers
Session 4 Post Test
Week 5
Session 5 Pre-Test Glossary
Word Search IPv6
Remote Connections
Matching Crossword
Group Project The Last Mile
Remote Access
Individual Project Network Optimization
Physical Network Protection
Maintaining Network Integrity
The Art of Network Support
Lab1: LAN Issues Lab 2: WAN Issues
Lab 3: Wireless Issues Labs
Short Answers
Session 5 Post Test
*Complete the corresponding section of the Listing Fill in the Blank Exercise.
LearnKey training segments are underlined. Activities are italicized. Tests are bolded.
Introduction xxix
In
trod
uctio
n
Sam
ple
6 Week Plan
Monday Tuesday Wednesday Thursday Friday
Week
1
Session 1 Pre-Test Introduction
Packets
Glossary Word Search
Matching Crossword
Topologies
Building a Network with OSI
Research Topic Network Cabling
Ethernet Basics 10/100Base
Ethernet Group Project
Short Answer
Individual Project
Labs
Week
2 Session 1 Post Test
Session 2 Pre-Test Read Article::
CompTIA Gets Technical Glossary
Crossword Word Search
Matching
Modern Ethernet
Structured Cabling
Structured Cabling
Tools
Group Project
Introducing TCP/IP Basic IP Addressing
Advanced IP Ad-dressing
Individual Project
Week
3
Short Answer
Labs
Research Topic
Session 2 Post Test
Session 3 Pre-Test
Glossary Word Search Subnetting
DHCP Matching Crossword
Network Naming Windows Name
Resolution
Research Topic Introducing TCP/IP
Ports Short Answers
Week
4
Static Routing Firewalls
Group Project Individual Project
Labs
Session 3 Post Test
Session 4 Pre-Test
Glossary Crossword
Internet Applications
Part I
Word Search
Matching
Group Project
Internet Applications
Part II
Encryption
Authentication Wireless
Week
5
Individual Project Implementing Wire-
less
Advanced Networking
Devices
Labs
Short Answers
Session 4 Post Test
Session 5 Pre-Test
Glossary Word Search
IPv6 Remote Connections
Matching Crossword
Group Project
Week
6
The Last Mile Remote Access Individual Project
Network Optimiza-tion
Physical Network Protection
Maintaining Network Integrity
The Art of Network Support
Lab1: LAN Issues Lab 2: WAN Issues Lab 3: Wireless Is-
sues
Labs Short Answers
Session 5 Post Test
xxx Introduction
In
trod
uctio
n
Sam
ple
7 Week Plan
Monday Tuesday Wednesday Thursday Friday
Week
1
Session 1 Pre-Test Introduction
Packets Glossary
Word Search
Matching Crossword
Topologies Building a Network
with OSI Research Topic
Network Cabling Ethernet Basics
10/100Base Ethernet Group Project
Individual Project Short Answer
Labs
Week
2
Session 1 Post Test
Session 2 Pre-Test
Read Article:: CompTIA Gets Techni-
cal Glossary
Crossword
Word Search
Matching
Modern Ethernet
Group Project
Week
3
Structured Cabling
Structured Cabling
Tools
Individual Project
Introducing TCP/IP
Basic IP Addressing Advanced IP Addressing
Research Topic
Short Answer
Labs Session 2 Post Test
Session 3 Pre-Test
Subnetting DHCP
Week
4
Glossary Word Search
Matching Crossword
Network Naming Windows Name
Resolution Research Topic
Introducing TCP/IP Ports
Static Routing Firewalls
Short Answers Group Project
Individual Project Labs
Session 3 Post Test
Week
5
Session 4 Pre-Test
Internet Applica-
tions Part I
Glossary Crossword
Word Search
Matching
Group Project
Internet
Applications Part II
Encryption
Authentication Wireless
Individual Project
Week
6
Implementing Wireless
Advanced
Networking Devices
Labs
Short Answers Session 4 Post Test
Session 5 Pre-Test Glossary
Word Search IPv6
Remote Connec-tions
Matching Crossword
Group Project The Last Mile
Remote Access
Week
7
Individual Project Network Optimiza-
tion
Physical Network Protection
Maintaining Net-work Integrity
The Art of Network Support
Lab1: LAN Issues Lab 2: WAN Issues
Lab 3: Wireless Issues
Labs Short Answers
Session 5 Post Test
Introduction xxxi
In
trod
uctio
n
Sam
ple
8 Week Plan
Monday Tuesday Wednesday Thursday Friday
Week
1
Session 1 Pre-Test Introduction
Packets Glossary
Word Search
Matching Crossword
Topologies Building a Network
with OSI Research Topic
Network Cabling Ethernet Basics
10/100Base Ethernet
Group Project
Individual Project
Short Answer
Labs
Week
2
Session 1 Post Test
Session 2 Pre-Test Read Article::
CompTIA Gets Tech-nical
Glossary Crossword
Word Search
Matching
Modern Ethernet
Structured Cabling
Structured Cabling
Tools
Group Project
Week
3
Introducing TCP/IP
Basic IP Addressing Advanced IP Ad-
dressing
Individual Project Short Answer
Labs
Research Topic Session 2 Post Test
Session 3 Pre-Test
Glossary Subnetting
DHCP
Week
4
Word Search Matching Crossword
Network Naming Windows Name
Resolution Research Topic
Introducing TCP/IP Ports
Static Routing Firewalls
Short Answers Group Project
Individual Project Labs
Week
5 Session 3 Post
Test Session 4 Pre-Test
Glossary Internet Applications
Part I
Crossword
Word Search
Matching
Group Project
Week
6
Internet Applica-
tions Part II
Encryption
Authentication Wireless
Implementing Wire-less
Individual Project Advanced Network-
ing Devices
Labs
Short Answers
Week
7 Session 4 Post
Test Session 5 Pre-Test
Glossary
Word Search IPv6
Remote Connections
Matching Crossword
Group Project The Last Mile
Remote Access
Week
8
Individual Project Network Optimiza-
tion Physical Network
Protection
Maintaining Net-work Integrity
The Art of Network Support
Lab1: LAN Issues Lab 2: WAN Issues
Lab 3: Wireless Issues
Labs Short Answers
Session 5 Post Test
xxxii Introduction
In
trod
uctio
n
Sam
ple
Skills Assessment
Skills 1 2 3 4 5
Finding the MAC Address
Finding the MAC on a Linux System
Point-to-Multipoint
RJ Connectors
Duplex LC Connector
Configuring IP Settings
Ping Command
Using MAC Command Programs
Accessing Root Hints List
Services
View DHCP Port
Filtering Wireshark Results
Starting SNMP
Instructions: Rate your skills with the following tasks on a level from 1-5.
Poor Excellent Sam
ple
Introduction xxxiii
In
trod
uctio
n
Sam
ple
Accessing Telnet with PuTTY
Using SSH on PuTTY
Connecting to FTP
Connecting to Wireless Networks
Creating a VLAN
Modify VLAN Ports
Quality of Service
Configuring IPv4
IP Address Scan
Poor Excellent
Skills 1 2 3 4 5 Sam
ple
xxxiv Introduction
In
trod
uctio
n
Sam
ple
LearnKey offers video-based training solutions which are flexible enough to accommodate the
private student, as well as educational facilities and organizations.
Our course content is presented by top experts in their respective fields, and provides clear and comprehensive information. The full line of LearnKey products have been extensively reviewed to meet superior standards of quality. The content in our courses has also been endorsed by organizations such as Certiport, CompTIA®, Cisco, and Microsoft. However, it is the testimonials given by countless satisfied customers that truly set us apart as leaders in the information training world.
LearnKey experts are highly qualified professionals who offer years of job and project experience in their subjects. Each expert has been certified in the highest level available for their field of expertise. This provides the student with the knowledge necessary to also obtain top level certifications in the field of their choice.
Our accomplished instructors have a rich understanding of the content they present. Effective teaching encompasses not only presenting the basic principles of a subject, but understanding and appreciating organization, real-world application, and links to other related disciplines. Each instructor represents the collective wisdom of their field and within our industry.
Our Instructional Technology
Each course is independently created, based on standard objectives provided by the manufacturer for which the course was developed.
We ensure that the subject matter is up-to-date and relevant. We examine the needs of each student and create training that is both interesting and effective. LearnKey training provides auditory, visual, and Kinesthetic learning materials to fit diverse learning styles. The following are three levels of implementation:
Standard Training Model
The standard training model allows students to proceed through basic training, building upon primary knowledge and concepts to more advanced application and implementation. In this method students will use the following toolset:
Pre-assessment: The pre-assessment is used to determine the student’s prior
knowledge of the subject matter. It will also identify a student’s strengths and weaknesses, allowing the student to focus on the specific subject matter he/she needs to improve most. Students should not necessarily expect a passing score on the pre-assessment as it is a test of prior knowledge.
Best Practices Using LearnKey’s Online Training
Introduction xxxv
In
trod
uctio
n
Sam
ple
Video training session: Each course of training is divided into sessions that are
approximately two hours in length. Each session is divided into topics and subtopics.
Post test: The post test is used to determine the student’s knowledge gained from
interacting with the training. In taking the post test, students should not consult the training or any other materials. A passing score is 80 percent or higher. If the individual does not pass the post test the first time it is taken LearnKey would recommend the incorporation of external resources such as the workbook and additional customized instructional material.
Intermediate Training Model
The intermediate training model offers students additional training materials and activities which allows for better retention, review, and interaction. This model includes not only the standard model material, but also includes the following toolset:
Study guides: Study guides are a list of questions missed which can help students
recognize areas of weakness and necessary focus. They can be accessed from either the pre-assessment or post test.
Labs: Labs are interactive activities that simulate situations presented in the
training. Step-by-step instructions and live demonstrations are provided.
Workbooks: Workbooks have a variety of activities, such as glossary puzzles, short answer questions, practice exams, research topics, and group and individual projects, which allow the student to study and apply concepts presented in the training.
Master Training Model
The master training model offers the student an additional opportunity to prepare for certification by further examining his/her knowledge. This model includes the materials used in the standard and intermediate models, as well as the MasterExam.
Master Exam: The MasterExam draws from a large pool of questions to provide a unique testing experience each time it is taken. LearnKey recommends a student take and pass the exam, with a score of 80 percent or higher, four times in order to prepare for certification testing. Study guides can also be accessed for the MasterExam.
Sam
ple
Sam
ple
Session 1
Sam
ple
Session 1 39
Sessio
n 1
Sam
ple
Session 1 Time Tables
Session 1
Introduction 00:07:18
Packets 00:15:23
Topologies 00:09:45
Building a Network with OSI 00:15:01
Network Cabling 00:17:02
Ethernet Basics 00:20:35
10Base/100Base Ethernet 00:11:34
Actual Time 01:36:38
Session 1
Introduction 00:10:57
Packets 00:23:04
Topologies 00:14:37
Building a Network with OSI 00:22:30
Network Cabling 00:25:33
Ethernet Basics 00:30:52
10Base/100Base Ethernet 00:17:21
Training Time 02:24:54
Sam
ple
40 Session 1
Sessio
n 1
Sam
ple
Fill-in-the-Blanks
Instructions: While watching Session 1, fill in the missing words according to the
information presented by the instructor.
[References where answers are found are in brackets.]
Introduction
1. Network devices is the objective which covers topics such as switches, routers and
wireless access points. [Network+ Domains]
Packets
1. The hexadecimal equivalent to the binary group 1010 is Ah. [Binary to Hex]
2. The MAC address is burned into the Network Card at the factory which it was made.
[IPconfig]
3. The OUI is represented in the first 24 bits of a MAC Address. [IPconfig]
4. The last 24 bits of the MAC address are called the host identifier or unique identifier.
[IPconfig]
Topologies
1. Topology is the term used to describe methods of physically wiring computers
together. [Bus Topology]
2. Ring topologies move packets in one direction. [Ring Topology]
3. Mesh topology physically connects every computer to every other computer.
[Mesh Topology]
4. The formula n(n-1)/2 is used to determine the number of connections needed to
create a fully meshed network. [Mesh Topology]
Session 1 41
Sessio
n 1
Sam
ple
Building a Network with OSI
1. Cabling, hubs, creating, and repeating copies of a frame are elements of the physical
layer of the OSI model. [Physical Layer]
2. A broadcast domain is a term used to describe an array of computers linked by a hub,
in which one computer sends a piece of information and every other computer receives
it. [Frames]
3. Layer two of the OSI model is called the data link layer. [Data-link layer]
4. A router works on the network layer to interconnect multiple local area networks using
logical addresses. [Network Layer]
5. The terms assemble and disassemble are associated with the transport layer of the
OSI model. [Transport Layer]
6. PDF files and PostScript are examples of the presentation layer. [Presentation Layer]
7. The application layer is layer seven of the OSI model. [Application Layer]
Network Cabling
1. A Coaxial Cable has two wires with a shared axis. [Coaxial]
2. UTP, or Unshielded Twisted Pair is a very common cable consisting of twisted pairs
of cable wrapped in a plastic sheath. [Unshielded Twisted Pair]
3. Bandwidth is defined by Cat levels. [Cat levels]
4. Cat 4 has a capacity of 20 BPS. [Cat levels]
5. RJ-45 cable connectors are the most common type of 4 pair connectors.
[RJ Connectors]
6. RJ-11 connectors are designed to handle two pairs of wire. [RJ Connectors]
7. PVC rated cable has a very low fire rating and is not readily used as a network cable.
[Cable Fire Ratings]
8. Single Mode fiber optic cable uses lasers instead of regular light. [Fiber optic]
9. There is one glass fiber in a fiber optic cable used for sending and receiving
information. [Fiber optic]
10. ST connectors are commonly used with fiber optic cable. [Fiber Connectors]
42 Session 1
Sessio
n 1
Sam
ple
Ethernet Basics
1. Full-duplex allow two parties to communicate simultaneously. [Fiber Connectors]
2. CRC, data, type, Source MAC, and Destination MAC are all elements included in the
Ethernet. [Ethernet Frame]
3. Data which is less than 46 bytes requires a pad. [Ethernet Frame]